[1]
“DETECTION OF RANSOMWARE ATTACKS USING PROCESSOR AND DISK USAGE DATA ”, IJESR, vol. 14, no. 2s, pp. 436–455, Jul. 2025, Accessed: Jan. 13, 2026. [Online]. Available: https://www.ijesr.org/index.php/ijesr/article/view/881